CVE-2023-53271

Source
https://cve.org/CVERecord?id=CVE-2023-53271
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53271.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53271
Downstream
Related
Published
2025-09-16T08:07:00.565Z
Modified
2026-04-11T12:46:43.923233Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
ubi: Fix unreferenced object reported by kmemleak in ubi_resize_volume()
Details

In the Linux kernel, the following vulnerability has been resolved:

ubi: Fix unreferenced object reported by kmemleak in ubiresizevolume()

There is a memory leaks problem reported by kmemleak:

unreferenced object 0xffff888102007a00 (size 128): comm "ubirsvol", pid 32090, jiffies 4298464136 (age 2361.231s) hex dump (first 32 bytes): ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................ ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................ backtrace: [<ffffffff8176cecd>] __kmalloc+0x4d/0x150 [<ffffffffa02a9a36>] ubiebacreate_table+0x76/0x170 [ubi] [<ffffffffa029764e>] ubiresizevolume+0x1be/0xbc0 [ubi] [<ffffffffa02a3321>] ubicdevioctl+0x701/0x1850 [ubi] [<ffffffff81975d2d>] __x64sysioctl+0x11d/0x170 [<ffffffff83c142a5>] dosyscall64+0x35/0x80 [<ffffffff83e0006a>] entrySYSCALL64afterhwframe+0x46/0xb0

This is due to a mismatch between create and destroy interfaces, and in detail that "newebatbl" created by ubiebacreatetable() but destroyed by kfree(), while will causing "neweba_tbl->entries" not freed.

Fix it by replacing kfree(newebatbl) with ubiebadestroytable(neweba_tbl)

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53271.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
799dca34ac543485f581bd8464ec9b1c4f0f852a
Fixed
09780a44093b53f9cbca76246af2e4ff0884e512
Fixed
26ec2d66aecab8ff997b912c20247fedba4f5740
Fixed
07b60f7452d2fa731737552937cb81821919f874
Fixed
31d60afe2cc2b712dbefcaab6b7d6a47036f844e
Fixed
95a72417dd13ebcdcb1bd0c5d4d15f7c5bfbb288
Fixed
27b760b81951d8d5e5c952a696af8574052b0709
Fixed
5c0c81a313492b83bd0c038b8839b0e04eb87563
Fixed
1e591ea072df7211f64542a09482b5f81cb3ad27

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53271.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.9.0
Fixed
4.14.308
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.276
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.235
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.173
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.100
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.18
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.5

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53271.json"